­
Penetration Testing for E-commerce Applications - All Articles - CISO Platform

Penetration Testing for E-commerce Applications

Over the past decade, E-Commerce applications have grown both in terms of numbers and complexity. Currently, E-Commerce application are going forward becoming more personalized, more mobile friendly and rich in functionality. Complicated recommendation algorithms are constantly running at the back end to make content searching as personalized as possible. Here we will learn about the necessity of penetration testing for E-commerce Applications.

 

Why a conventional application penetration testing  for E-commerce Applications is not enough?

E-Commerce applications are growing in complexity, as a result conventional application penetration is simply not enough. Conventional application penetration testing focus on vulnerability classes described in OWASP or WASC standards like SQL Injection, XSS, CSRF etc.

 

It is required to create specialized framework of penetration testing for E-Commerce applications which is  tailored  and should have following features:

  • Comprehensive Business Logic Vulnerabilities for various functional modules related to E-Commerce Applications.
  • Comprehensive flaws related to various Integrations with various 3rd party products.

(Read more:  Can your SMART TV get hacked?)


Key Vulnerability Classes Covered:

Some of the vulnerability classes covered as part of E-commerce penetration testing are listed below.


Order Management Flaws

Order management flaws primarily consists of misusing placing an order functionality. The exact vulnerabilities will depend on the kind of application, however some examples are listed below:


Possibility of Price manipulation during order placement.

  • Possibility of manipulating the shipping address after order placement.
  • Absence of Mobile Verification for Cash-on-Delivery orders.
  • Obtaining cash-back/refunds even after order cancellation.
  • Non deduction of discounts offered even after order cancellation
  • Possibility of illegitimate ticket blocking for certain time using automation techniques.
  • Client side validation bypass for max seat limit on a single order.
  • Bookings/Reservations using fake a/c info.
  • Usage of Burner (Disposable) phones for verification.


Coupon and Reward Management Flaws

Coupons and Reward management flaws are extremely complex in nature. Some examples are listed below:

 

  • Coupon Redemption possibility even after order cancellation.
  • Bypass of coupon’s terms & conditions.
  • Bypass of coupon’s validity.
  • Usage of multiple coupons for the same transaction.
  • Predictable Coupon codes.
  • Failure of re-computation in coupon value after partial order cancellation.
  • Bypass of coupon’s validity date.
  • Illegitimate usage of coupons with other products.


(Read more:  How to choose your Security / Penetration Testing Vendor?)

Payment Gateway Integration (PG) Flaws

Many of the classical attacks on E-Commerce applications are because of Payment gateway integrations. Buying a pizza in 1$ is a classical example of misusing PG integration by an attacker.

  • Price modification at client side with zero or negative values.
  • Price modification at client side with varying price values.
  • Call back URL manipulation.
  • Checksum bypass.
  • Possibility of price manipulation at Run Time.


Content Management System (CMS) Flaws

Most E-Commerce applications have backend content management system to upload / update content. In most cases, CMS will be integrated with resellers, content providers and partners. For example, hotel E-Commerce application will be integrated with individuals hotels or with multiple partners. As a result of increased complexity, there are multiple sub vulnerability classes that need to testes, some of them are listed below:

  • File management logical flaws
  • RBAC Flaws
  • Notification System Flaws
  • Misusing Rich Editor Functionalities
  • 3rd Party APIs Flaws
  • Flaws in Integration with PoS (Point of Sales Devices)


Conventional Vulnerabilities

Apart from business logic vulnerabilities, conventional vulnerabilities are also part of the penetration testing framework. Examples of conventional vulnerabilities are SQL Injection, Cross Site Scripting (XSS), CSRF and other vulnerabilities defined as part of OWASP.


This is a re-post of the blog originally published on CISO Platform

Link to original blog: http://www.cisoplatform.com/profiles/blogs/penetration-testing-e-commerce-applications

 

Votes: 0
E-mail me when people leave their comments –

Community Head, CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

City Round Table Meetup - Mumbai, Bangalore, Delhi, Chennai, Pune, Kolkata

  • Description:
    CISO Playbook Round Table Overview : 
    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology Implementation: From…
  • Created by: Biswajit Banerjee
  • Tags: ciso, playbook, round table

Round Table Dubai 2025 | GISEC

  • Description:
    CISO Playbook Round Table Overview : 

    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology…
  • Created by: Biswajit Banerjee

Fireside Chat With Dan Bowden (Global Business CISO, Marsh McLennan (Marsh, Guy Carpenter, Mercer, Oliver Wyman))

  • Description:

    We’re excited to bring you an insightful fireside chat on "Navigating the Cyber Insurance Landscape: Key Considerations for CISOs" with Dan Bowden (Global Business CISO, Marsh McLennan) and Erik Laird (Vice President - North America, FireCompass). In this fireside chat, we'll decode the complexities of cyber insurance from a CISO’s lens and uncover how to make smarter, security-aligned decisions when it comes to policy design, claims, and ROI.

    As cyberattacks grow in…

  • Created by: Biswajit Banerjee
  • Tags: ciso, cyber insurance, dan bowden

CISO Platform: CISO 100 Awards & Future CISO Awards @ Atlanta

  • Description:

    Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. Recommend someone you know deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !

    CISO Platform is collaborating as a community partner with EC-Council’s Global CISO Forum, supporting initiatives such as the CISO Platform…

  • Created by: Biswajit Banerjee